Security of Computer Operations

  • Ken Slater


As computer operations become more diverse, distributed and complex the varieties of threats have increased. Although the more technical security breaches may now often be generated many miles from the main computer installation, using communications technology, they are still likely to be directed at data or software held and processed in the centre, and their chance of success will depend on the level of control over the computer installation.




Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Touche Ross Management Consultants 1991

Authors and Affiliations

  • Ken Slater

There are no affiliations available

Personalised recommendations